Information Operations



Similar documents
This publication is available at Army Knowledge Online (

NATO UNCLASSIFIED RELEASABLE TO EAPC INTERNATIONAL MILITARY STAFF. ETAT-MAJOR MlLITAIRE INTERNATIONAL

AUSA Background Brief

Navy Information Dominance Industry Day

Army Doctrine Update

NATO STANDARD AJP ALLIED JOINT DOCTRINE FOR PSYCHOLOGICAL OPERATIONS

The Guidelines for U.S.-Japan Defense Cooperation April 27, 2015

DOCUMENT CHANGE RECORD

PREFACE. 1. Scope. 2. Purpose

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM

Risk Management Handbook

Information Dominance as a Warfighting Discipline

Statement by Mr. Stephen Welby. Assistant Secretary of Defense for Research and Engineering. Before the

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

Joint Publication Operations Security

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

A Network Centric Info-Structure for the Swedish Armed Forces

Troops Time Planner and Simulation Models For Military

Simulating Information Warfare Using the HLA Management Object Model

Some Thoughts on the Future of Cyber-security

Hybrid Warfare & Cyber Defence

An Overview of Large US Military Cybersecurity Organizations

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

ADRP20 AUGUST201 HEADQUARTERS,DEPARTMENTOFTHEARMY

The Intelligent, Proactive Information Assurance and Security Technology IPDM

THE CHALLENGES OF CYBERSECURITY TRAINING

BY ORDER OF THE SECRETARY OF THE AIR FORCE. AIR FORCE DOCTRINE DOCUMENT August 1999

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Information Operations Primer

U.S. COMMERCIAL REMOTE SENSING POLICY. April 25, 2003 FACT SHEET

PSYOP Campaign Planning

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Memorandum. Zie bijlage. Behavioural and Societal Sciences Kampweg DE Soesterberg Postbus ZG Soesterberg. Van Dr. J.B.F.

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Innovation. Performance. Security. SMARTSCAN man-portable land EW solutions. target. up-to-the-minute situational intelligence

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise

Long Term Defence Study

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Cyberspace Operations

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

POLICIES CONCERNING THE NAVAL POSTGRADUATE SCHOOL. 1. Purpose. To update and clarify policies concerning the Naval Postgraduate School.

Legal Issues / Estonia Cyber Incident

Counterintelligence Awareness Glossary

CyberSecurity Solutions. Delivering

Director of Intelligence Proposed Research Topics

WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)

Cyber Security Summit China and Cyber Warfare Desmond Ball 25 July 2011

SatCom For Net-Centric Warfare July/August MilsatMagazine

Forecast to Industry 2015

The Comprehensive National Cybersecurity Initiative

Strategic PSYOP management a marketing management approach

Manned Information Security

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

MCSC & PEO LS Small Business Conference 19 November Brigadier General Michael M. Brogan

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Department of Defense Washington, D.C.

The National Counterintelligence Strategy of the United States

FM 6-02 SIGNAL SUPPORT TO OPERATIONS

Australian Defence Policy in the Information Age. Submission for the 2015 Australian Defence White Paper

Obtaining Enterprise Cybersituational

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

EC-Council. Certified Ethical Hacker. Program Brochure

2013 IOS Press. This document is published in:

THE WHITE HOUSE Office of the Press Secretary

Cyber Learning Solutions

A Community Position paper on. Law of CyberWar. Paul Shaw. 12 October Author note

How Covert Agents Infiltrate the Internet to Manipulate, Deceive,...

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY

ADP 3-0 UNIFIED LAND OPERATIONS. OCTOBER 2011 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.

Defense Security Service

FM 2-0 INTELLIGENCE MAY DISTRIBUTION RESTRICTION: Approved for public release, distribution is unlimited HEADQUARTERS DEPARTMENT OF THE ARMY

The 5 Cybersecurity Concerns You Can t Overlook

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL. (U) SIGINT Strategy February 2012

NSF Cyber Security Conference. FBI Counterintelligence Domain Program Briefing

DOD DIRECTIVE CLIMATE CHANGE ADAPTATION AND RESILIENCE

Cyber Superiority. Weapon System Normalization Update. Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority. AFCEA Luncheon Jan 2015

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration

Trends Concerning Cyberspace

AIR- SEA BATTLE. Service Collaboration to Address Anti-Access & Area Denial Challenges. May 2013

How To Create An Insight Analysis For Cyber Security

NORTH ATLANTIC MILITARY COMMITTEE COMITE MILITAIRE DE L ATLANTIQUE DE NORD

IP-NBM. Copyright Capgemini All Rights Reserved

DEPARTMENT OF THE NAVY CH I EF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

MA PROGRAM IN MILITARY STRATEGIC STUDIES INTRODUCTION

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports

Information Assurance. and Critical Infrastructure Protection

Levels of Threat Intelligence

Faculdade de Direito, Lisboa, 02-Jul The Competitive Advantage of Cybersecurity

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives:

Transcription:

Information Operations Introductie

Waar hebben we het over? P.A. Allen, Information Operations Planning, Artech House, Norwood, 2007 D.S. Alberts et al, Understanding Infromation Age Warfare, CCRP, August 2001 Effects / Outcomes Increased Military Effectiveness Actions Increased Combat Power Decisions Perceptions Information Superiority Information Know the enemy Fog and friction 2

Information Environment M.J. Romanych, A Theory Based View of IO, Joint Information Operations Center, spring 2005 message medium eigenschap van materie Physical Domain Real world Infosystems and networks Links info environment to land, sea, air, space Geography (terrain), weather, infrastructure, population Information Domain Intersection between cognitive and physical domain Where information exists and flows Info quality, reach, interaction Cognitive Domain Individual and collective consciousness Where decisions are made Perceptions, attitudes, beliefs 3

Primitives (building blocks) of the Information Environment Waarnemen D.S. Alberts et al, Understanding Infromation Age Warfare, CCRP, August 2001 Oriënteren Physical Domain sensing Information Domain Cognitive Domain data knowledge awareness Event / Object information understanding action decision 4 Handelen Beslissen

Primitives (building blocks) of the Information Environment D.S. Alberts et al, Understanding Infromation Age Warfare, CCRP, August 2001 Physical Domain Cognitive Domain sensing data Information Domain shared knowledge shared awareness Event / Object shared information understanding actions collaboration synchronisation decision 5

Attributes of the Information Domain Quality (Richness) Accuracy Relevancy Timeliness Q Reach degree of info sharing Information Age Industrial Age R 6

Attributes of the Information Domain Quality Accuracy Relevancy Timeliness Reach degree of info sharing Interaction quality of info exchange Q Info position Info needs R I 7 Information Advantage = Own info situation Adversaries info situation

Information Superiority (Operational Advantage) Physical Domain Information Domain Cognitive Domain Force / Position Advantage Attack and defend infosystems Manipulate use, content and flow of information Information Advantage Decision-making Advantage Influence interpretation and use of info The synchronized activities that impact the use, content, and flow of information in the battlespace with the purpose to gain and maintain an information advantage over the adversary. (M.J. Romanych, A Theory Based View of IO, Joint Information Operations Center, spring 2005) 8

IO Functions and IO Functions Capabilities 1. Deter, discourage, dissuade and direct an enemy 2. Protect own plans and misdirect enemy s 3. Control adversial communications and networks and protect own IO Capabilities 1. Electronic Warfare 2. Psychological Operations 3. Operations Security 4. Military Deception 5. Computer Networks Operations 9 Supporting and Related Capabilities 1. Physical security, information assurance, counter intelligence, physical attack 2. Public affairs, civil military operations The integrated deployment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related activities, to influence, disrupt, corrupt, or usurp adversarial human and automated decisionmaking while protecting our own. C.J. Lamb, Information Operations as a Core Competency, Joint Forces Quartely, Issue 36, 2004

IO Fundamenten en IO Fundamenten Activiteiten 1. Alles is beïnvloeding 2. Sociologische besluitvormingsprocessen 3. Geloofwaardigheid 4. Denken in en vanuit effecten IO Activiteiten 1. Key Leader Engagement 2. Psychological Operations 3. Public Affairs 4. Civil Military Cooperation 5. Command and Control Warfare 6. Presence, Posture and Profile De coördinatie van activiteiten in het informatiedomein die gericht zijn op de beïnvloeding van kennis, houding en gedrag van goedgekeurde doelgroepen. Dit omvat tevens de bescherming van de eigen vrijheid van beweging binnen het informatiedomein, de bescherming van eigen informatie en informatieprocessen en het aangrijpen van informatie en informatiesystemen van potentiële tegenstanders. I.M. van Osch, Information Operations. Synchronisatie van actie en informatie, Militaire Spectator, Nr. 5-2011 10

Information Superiority Information Operations Information in Warfare (gain/exploit) Information Warfare (attack/defend) Counter Information ISR Precision Navigation & Positioning Weather Public Affairs Other Information Collection / Dissemination Activities Offensive CI Electronic Warfare Military Deception Computer Network Attack Psychological Operations Physical Attack Public Affairs Defensive CI Electronic Protection Counter Deception Computer Network Defense Counter Propaganda Operations Security Counter Intelligence Public Affairs The synergistic and systematic use of all tools as appropriate to create an effect which elicits a desired response. 11

Information Operations Manipulate use, content and flow of information Physical Domain Weather C2 Warfare Computer Network Operations Operations Security Information Domain Electronic Warfare Military Deception Presence, Posture, Profile Cognitive Domain Civil Military Cooperation Public Affairs Cyber Warfare Physical Attack Precision Navigation & Positioning ISR Counter Intelligence Information Collection & Dissemination Activities Navigation Warfare Key Leader Engagement Psychological Operations Counter Propaganda 12

Information Operations Manipulate use, content and flow of information Physical Domain Computer Network Operations Navigation Warfare Information Domain Cyber Warfare Presence, Posture, Profile Cognitive Domain Civil Military Cooperation Public Affairs Electronic Warfare Psychological Operations Information Collection & Dissemination Activities Counter Propaganda Key Leader Engagement 13

2003 (IO Roadmap) / 2006 (JP 3-13) The integrated employment of the core capabilities of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related activities, to influence, disrupt, corrupt, or usurp adversarial human and automated decisionmaking while protecting our own. 2005 (Romanovych) The synchronized activities that impact the use, content, and flow of information in the battlespace. 2008 (MC 422/3) A military function to provide advice and co-ordination of military information activities in order to create desired effects on will, understanding and capabilities of adversaries, potential adversaries and other NAC approved parties in support of Alliance mission objectives. 2012 (MC 422/4) A staff function to analyze, plan, assess and integrate Information Activities to create desired effects on will, understanding and capabilities of adversaries, potential adversaries and NAC approved audiences in support of Alliance mission objectives. 14

Information Operations Introductie